Sciweavers

698 search results - page 12 / 140
» Evaluating Key Statements Analysis
Sort
View
106
Voted
SENSYS
2005
ACM
15 years 7 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
133
Voted
PLDI
2010
ACM
15 years 6 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
131
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Study on Evaluation Method of Practical Teaching: A Practical Teaching Test Analysis
The practical teaching is a key to train students in practical ability and innovative consciousness. But, evaluation standards of practice teaching are still confusion. By analyzin...
Haiwei Jin
CIKM
2010
Springer
14 years 12 months ago
Web search solved?: all result rankings the same?
The objective of this work is to derive quantitative statements about what fraction of web search queries issued to the state-of-the-art commercial search engines lead to excellen...
Hugo Zaragoza, Berkant Barla Cambazoglu, Ricardo A...
108
Voted
CEC
2007
IEEE
15 years 5 months ago
Theoretical derivation, analysis and empirical evaluation of a simpler Particle Swarm Optimiser
In this paper we derive a simpler form of Particle Swarm Optimiser (PSO) which still retains the key properties of the original model. We do so by progressively altering the origin...
Riccardo Poli, Dan Brattonx, Tim Blackwell, James ...